Call

Webex

Hear it straight from our leaders and experts in cybersecurity

From March 6-8 we are broadcasting live from Cisco Live Melbourne. Join us as we bring to you more than 30+ Cybersecurity Insights sessions about our products, trends and the latest in technology from our top leaders and security experts. From Tech Talks, Threat Insights, Customer and Business Insights - learn how to defend your network and securely harness technology.

Agenda

March 5 (Tuesday)

Session Time

Session Name

Speaker

Synopsys

9:30AM - 10:10AM (AU),
11:30AM - 12:10PM (NZ)

Security above Everything

John Maynard, Vice President, Global Security Sales, Cisco

Cisco prioritises security in all that we do so we can attain effective network security to face tomorrow's evolving threats. Our Best of Breed portfolio, Architectural approach and industry-leading threat intelligence gives our customers the scope, scale, and capabilities to keep up with the complexity and volume of threats. Putting security above everything helps us innovate while keeping our assets safe. Hear from our Global VP on how Security is Foundational!

10:10AM - 10:55AM (AU),
12:10PM - 12:55PM (NZ)

Special Guest: The Fine Art of Creating a Cybersecurity Strategy to Drive Transformation

As businesses become more digitized and interconnected, the impact cyberattacks have on brand value, customer trust, and physical safety increases, yet many firms still underinvest in security, considering it a low-level, compliance-driven function. This session will transfer insights and knowledge on how to transform their security capability into one that is risk-aligned, forward-thinking, and business-enabling. In this session, we will also discuss how to: 1) create a strategic security program, 2) document that strategy 3) present it to the board to get resources, and turn it into transformational outcomes that better protect your firm and its customer.

11:15AM - 12:00PM (AU),
1:15PM - 2:00PM (NZ)

Special Guest Keynote: The impact and importance of Cybersecurity to Australia’s Economy, Industry, and Geo-political landscape

With the constantly evolving threat landscape, overwhelming complexity and volume of alerts impacting businesses a new approach to empower IT professional is required. Discover how Cisco is innovating across all parts of the network by creating a platform and integrated architecture where the role of the network is a foundational component of your defense strategy enabling you to increase Cyber Resilience and propel your business.

12:40PM - 12:50PM (AU),
2:40PM - 2:50PM (NZ)

Explore the World of Solutions

Andy Burke, System Engineer Lead, APJC, Cisco

1:35PM - 2:25PM (AU),
3:35PM - 4:25PM (NZ)

Security is Foundational: Building an Integrated Architecture

Shawn Henry, Global VP and GM, Security Business Group

Security technologies should work together to deliver more effective security outcomes, sharing data such as event, context, threat intelligence and policy. When security works together you can reduce the time to detect, respond and remediate. Learn how Cisco’s security portfolio can help.

2.25PM - 3.10PM (AU),
4:25PM - 5:10PM (NZ)

Leveraging Threat Intelligence to Drive Efficacy

Earl Carter, Manager of Engineering, Global, Cisco

Threat Intelligence, applied across all your security tools, helps you see more, block more and respond faster; Cisco Talos is the largest non-governmental threat intelligence organisation on the planet. With stories from the frontlines of security research, learn firsthand how threat intelligence can help you achieve best in class threat detection and response.

3:10PM - 3:55PM (AU),
5:10PM - 5:55PM (NZ)

The Journey to Zero Trust

John Scubel, Regional Vice President, Global, Cisco Duo

Bad actors don’t need to break in when they can simply log in. Cisco Trusted Access makes it easier and safer to grant and restrict access by establishing trust and software-defined perimeters based on dynamic context, not just static credentials or network topologies. Duo provides a user-centric zero-trust security platform for all users, devices and applications.

4:15PM – 4:45PM (AU),
6:15PM - 6:45PM (NZ)

Data Privacy & Security as Business Enablers

Michelle Dennedy, Vice President and Chief Privacy Officer, Cisco

Michelle is passionate about data privacy and protection, and for building better technology that matters. She works to raise awareness and create tools that promote privacy, quality, integrity, respect and asset-level possibilities for data. She works closely with dreamers at all levels and in businesses and organizations at all stages to support the combination of policy, practice and tools.

4:45PM - 5:15PM (AU),
6:45PM - 7:15PM (NZ)

Hear our panellists talk about the “Importance of Data Privacy as a Business Enabler”

One year on from GDPR and Australian Data Protection Act, we check in with Michelle Dennedy, to see how customers around the world are responding to the new legislation and how Asia Pacific should apply benchmarks to doing privacy better.

The cybersecurity landscape is constantly evolving, with threats getting smarter and more sophisticated. With more data, more devices, and more applications, businesses have more to protect. IT teams today are tasked with driving digital transformation and innovation, while managing security risks. They also face having limited resources to help navigate a fast-moving and complex threat landscape, which can seem overwhelming. In this session, Stephen Dane, Managing Director, Global Security Sales Organization, APJC, will shed light on the business challenges, needs and opportunities that he is seeing from customers. He will also talk about how businesses in the region are budgeting for security, how their purchase decisions differ, and the importance of a threat response framework in the wake of a breach.

The home phone rings… You answer.. The panicked voice on the phone says “the systems are all flashing alerts, BIG nasty red ones… We’re under attack” It’s your after-hours Operations team. Looks like you’ll be heading into the office on the weekend… Again. Unless you had Cisco Threat Response. Then your SOC team could have easily taken information from the disparate systems, triaged and taken care of this on their own… In this session we’ll stepping through the capabilities of Cisco’s Cyber Threat Response (CTR) tool, exploring integrations across Cisco and 3rd party systems and running through use cases via demonstrations. We will also be exploring the API and how this tool can be integrated into your existing operational toolset.

Zero Trust (ZT). Zero Trust Networking (ZTN). Forester's Zero Trust eXtended (ZTX). Gartner's Continuous Adaptive Risk and Trust Assessment (CARTA), Google's BeyondCorp, Jericho Forum, Cisco Trusted Access. What does any of this really mean to the security practitioner? There is so much marketing hype in our industry today, where everybody who has a security product is now somehow providing you with Zero Trust solutions. Come hear from Aaron Woland, Principal Engineer in Cisco’s Security team, where he will provide clarity to all this noise, and demystify all these terms, and explain how a ZT approach to security can provide for very efficient security and why it is complimentary to a threat-centric security strategy.

Security technologies should work together to deliver more effective security outcomes, sharing data such as event, context, threat intelligence and policy. When security works together you can reduce the time to detect, respond and remediate. Learn how Cisco’s security portfolio can help.

Cisco's Talos team specialises in early-warning intelligence and threat analysis necessary for maintaining a secure network. People responsible for defending networks realise that the security threat landscape is constantly in flux as attackers evolve their skills. Talos advances the overall efficacy of all Cisco security platforms by aggregating data, cooperating with teams of security experts, and applying the cutting-edge big data technology to security. In this talk we will perform deep analysis of recent threats and see how Talos leverages large datasets to deliver product improvements and mitigation strategies.

5G networks will require the data to be delivered faster with lower latency and connect millions of IoT devices using various architectures such as MEC, CUPS, Network Slicing and CRAN. This network transformation of mobile networks brings in various threat surfaces. This session would take the audience through the threat surfaces during the network transformation and how threats can be mitigated using Cisco’s end to end security architecture for Mobile Network Operators. We will focus on securing new evolving architectures such as Distributed architectures (MEC), Network Slicing &V2X. It would also cover aspects of securing virtualized infrastructures including NFVi.

SMBs are the economic engines of the economy across Asia Pacific. The latest Cisco SMB Digital Maturity Index has revealed that 61% of SMBs have started on their digitalization journey and transitioned to the cloud. With the transition to the cloud and challenges they face such as a lack of IT resources, cybersecurity is more important than ever. They’re also at risk of cyber-attacks and the threat shouldn’t be underestimated just because of their size. Tune in to this session to find out more about how Cisco is working with SMBs and startups to help them grow and protect their business.

1:10PM - 1:30PM (AU),
3:10PM - 3:30PM (NZ)

Cisco Domain Protection and Advanced Phishing Protection: Making the Most of the Next Layer in Email Security

Robert Sherwin and Alex Chan (Technical Engineers)

This session will provide Cisco Email Security customers a look into securing their email gateway at the next level with DMARC, DKIM, and SPF technologies that are now available from Cisco Domain Protection and Cisco Advanced Phishing Protection. Customers are encouraged to engage and provide their design and feature challenges.

1:40PM - 2:00PM (AU),
3:40PM - 4:00PM (NZ)

What Data? To Whom? To Where? For What? Cisco as Your Data Custodian for Security Services and More

We can all recognize a cloud service that we directly upload our data to or that we interact with via a browser or mobile app. However, increasingly, there is a "little bit of cloud" integrated with many other services including networking and security. We have all heard of devices leveraging the greater cloud for deep data analysis, machine learning and artificial intelligence. Some of Cisco's security devices do as well. But what information is being sent to Cisco, how is Cisco using it, and importantly how is Cisco protecting it and maintaining your privacy. Answers our customers need to risk assess their cloud consumption. The answer starts back at the design phase with Cisco's Secure Development Lifecycle all the way through to how we deliver SecOps. During this broadcast we will touch on all the aspects of data protection and privacy at Cisco and look briefly at Cisco Umbrella as examples of how this is achieved.

This discussion will touch upon key features and benefits of the Firepower multi-services security platforms. It will start with an overview of the key design principles behind Firepower 2100, 4100, and 9300 platforms. The new multi-instance capability on Firepower 4100 and 9300 appliances will be covered as well. Several performance optimization features, such as TLS hardware acceleration and Flow Offload will be addressed. In conclusion, a brief overview of NGFW clustering capability will be presented. Working knowledge of ASA and FirePOWER NGIPS features and deployment scenarios is required; working FTD knowledge is recommended.

Our customers have a workforce always on the go, app workloads in many clouds, and devices outside their control, so knowing who and what to trust is a critical IT security challenge. In this session, we will focus on the implications as it relates to Data Centre and Cloud environments. The reality for many organisations is that genuinely understanding the workloads in their Data Centre – in order to better trust and secure them – is already a challenging task. However, app workloads are becoming increasingly distributed across multiple clouds, developers are accelerating the use of new, highly iterative development models, and architectural approaches including container-based and server-less computing are now reaching production status – meaning that the need for a new approach is more urgent than ever. This session will review practical challenges customers are facing, and review compelling new ideas that are rapidly changing our ability to better protect our application workloads.

How can Cisco provide you trusted access to gain the visibility, segmentation and threat protection that every business needs? Cisco DNA Security is a key element in addressing the challenges of manual network changes and the security concerns that result. Traditional networks have perimeter defenses, but lack adequate security within. DNA Security embeds security into the network giving you back control of your enterprise.

The last couple of years have been rough on Cyber Security Practitioners as we have all realised that being “protected” isn’t enough – that something bad will happen, regardless of our efforts to protect ourselves against cyber threats. As a result, we need to take onboard a new capability, we need to hunt for the threats that get through, we need be prepared to response to threats in real-time and with confidence. In this Cybersecurity Insights Discussion, we’ll breaking down this response capability, by discussing what’s needed to be able to respond rapidly and with confidence, and how technologies can Cisco AMP can help.

Michelle is passionate about data privacy and protection, and for building better technology that matters. She works to raise awareness and create tools that promote privacy, quality, integrity, respect and asset-level possibilities for data. She works closely with dreamers at all levels and in businesses and organizations at all stages to support the combination of policy, practice and tools.

It's no secret that the network perimeter is blurry and expanding, so having the ability to secure applications, users, and devices with a zero trust architecture has become increasingly important for organizations. in this presentation, we will discuss how many organizations are achieving zero trust over time by leveraging Duo's platform. We will also present industry best practices when maturing into a zero trust model.

10:10AM - 10:30AM (AU),
12:10PM - 12:30PM (NZ)

Simplifying IoT Security

Simon Finn (Security Solutions Architect) hosted by Marc Blackmer

IoT security remains the largest inhibitor to businesses harnessing the innovation and growth potential of digitization. Whether it be deploying new networks and sensors or connecting OT networks, navigating the complexity of IoT security can be daunting, balancing business need against cyber resilience. Join Simon Finn to learn Cisco's view and approach to IoT security. This session will showcase a combination of tools, techniques and adopted frameworks to help manage IoT and cyber risk.

It is all about forward looking technologies within the Office of CTO at Security Business Group at Cisco. In addition to understanding security trends and challenges, the group monitors new technologies that can enhance the current portfolio or offer new solutions and at the same time provide reliable technical assessments of potential mergers and acquisitions. Come and hear Alok Mittal, Director of Strategy and Chief of Staff, to learn few of these trends, innovative technologies and the security start-up landscape.

The rapid adoption of Internet of Things (IoT) enabled devices and influx of new technologies such as artificial intelligence and machine learning can make businesses vulnerable to security risks and can cost millions. In this talk, explore the potential of Business Critical Services for cyber security, the new features and the value add to customer businesses. Learn about Cisco Customer Experience (CX) lifecycle journey and how Business Critical Services align to it.

12:40PM - 1:00PM (AU),
2:40PM - 3:00PM (NZ)

SD-WAN Security

Sarav Radhakrishnan (Distinguished Software Engineer)

As branches open up to direct cloud connections and run business critical applications over the internet, the traditional approach to securing the WAN, where traffic is back-hauled to the corporate firewall, is inefficient and costly. That’s because traditional WAN platforms were primarily designed to connect branches directly to data centers. They do not have the flexibility to deal with simultaneous connections to multiple cloud platforms, automatically selecting the most efficient and cost-effective routes. Organizations need a comprehensive and flexible software-defined architecture to secure the WAN while simplifying distributed network management and lowering connection costs. In effect, every WAN device must become software defined and secure. Therefore, we launched an advanced SD-WAN security stack with capabilities that solve critical edge security challenges. Cisco is providing IT with highly effective and scalable security for SD-WAN that is easy to manage, deploy, and maintain, enabling businesses to use cloud services of their choice with confidence. Cisco SD-WAN seamlessly connects devices and people to any cloud, providing a superior application experience while delivering consistent unified threat protection from branch to cloud. This session will talk about the use cases and the approach to address the specific use cases around SDWAN security.

Attackers leverage known bad IP's, URL, Domains and Files to get into the network and compromise the target. With Security Intelligence Feeds both from Cisco TALOS and Open Source (STIX and TAXII), comprising of IP,URL,DNS and SHA's we can block the known threat right before they enter your network. With Firepower Threat Defense and Firepower Management Center, we use this information that gets constantly updated for defending the network from the malicious actors.

Hear from Andrew Hobby, Vice-President, Systems Engineering, APJC, on why it is important that today’s young Engineers are equipped with a security-first mindset. A departure from days past, when security components used to be bolted on to systems as an add-on, Andrew explains how today’s engineers implement security at every developmental phase, resulting in the creation of far more secure systems.

Digitisation is rapidly changing our world as we know it today. With the number of connected objects expected to reach 50+ billion by the year 2020, attack opportunities continue to grow as well. Today's technology trends like mobility, cloud, and the Internet of Things are multiplying the points of infiltration into the company. And attackers are getting more sophisticated. They are often part of international cybercrime organisations, and they may understand your company, and your defences, better than you do. The cultural and personal aspects of cybersecurity are the same regardless of your company size or purpose. Hear how Cisco has radically improved it's cyber security posture through improvements in process, organisation structure, training, communications and other changes in culture.

3:40PM - 4:00PM (AU),
5:40PM - 06:00PM (NZ)

Hunting Down Cyber Attacks in the Cloud with Cisco Umbrella and Cisco Investigate

Cyber criminals are increasingly exploiting internet services to build agile and resilient infrastructures to launch attacks. The internet is an open system, but fragments of data broken up and spread across the web are not immediately visible. And, as more organisations move data and workloads to the cloud, cyber criminals are targeting those cloud services as a new entry point into companies. How can you gain visibility into what attackers are staging for future threats, protect your users anywhere they work, and also uncover the risk your organisation faces with cloud apps? This session explores how Security Analysts and Security Administrators can use Cisco Umbrella and Cloudlock to correlate internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs, file hashes) to build and deliver a new model of security that is pervasive and predictive, and expose attackers' infrastructure. We’ll also discuss how you can identify and thwart potential attacks against critical SaaS apps being used by your employees.

Network shares have been a popular target of computer worms, but their popularity waned in recent years, overshadowed by high-profile attacks that used email and compromised websites. This all changed about 18 months ago with the release of the EternalBlue exploit. As WannaCry cut a path of destruction across the threat landscape, attention was drawn back to network shares, and in particular a popular protocol central to many: Server Message Block (SMB).

Ransomware and IOT proliferation have exponentially increased the risk of breaches facing most enterprises and have highlighted the need for better visibility and security policy enforcement. Visibility of endpoints and applications is paramount and is often the first step towards securing your network. In this session we cover how Identity Services Engine(ISE) can help you bring visibility of IT and OT assets in your enterprise and reduce the number of unknown endpoints in your network. We will discuss the science behind profiling and how it can help you classify endpoints. We will also look into ways to gain visibility of applications and other contextual data collected through the ISE ecosystem.

Business Critical Services are designed to help our customers address their most pressing needs. Through our automation, analytics, security and technology expertise, we help our customers spend less time of “keeping the lights on” so they can focus time and budget on staying ahead of the technology curve, with security and agility at the heart of their infrastructure.

Last year, Cisco Talos observed attackers increasingly spreading sextortion-type attacks across the internet. In many cases the spammers harvested email addresses and passwords from a publicly available data breach, and then used this data to facilitate their sextortion attacks. When these kinds of spam campaigns make it into users' email inboxes, many of them may not be educated enough to identify that it's a scam designed to make them give away their bitcoins. Unfortunately, it is clear from the large amount of bitcoin these actors secured that there is still a long way to go in terms of educating potential victims.